US20140067687A1 - Clone defence system for secure mobile payment - Google Patents

Clone defence system for secure mobile payment Download PDF

Info

Publication number
US20140067687A1
US20140067687A1 US13/891,207 US201313891207A US2014067687A1 US 20140067687 A1 US20140067687 A1 US 20140067687A1 US 201313891207 A US201313891207 A US 201313891207A US 2014067687 A1 US2014067687 A1 US 2014067687A1
Authority
US
United States
Prior art keywords
value
counter
data communication
central processing
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/891,207
Inventor
Alessandro Gadotti
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
964 Bidco Ltd
Original Assignee
MPAYME Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/602,197 external-priority patent/US20130262309A1/en
Application filed by MPAYME Ltd filed Critical MPAYME Ltd
Priority to US13/891,207 priority Critical patent/US20140067687A1/en
Assigned to MPAYME LTD. reassignment MPAYME LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GADOTTI, ALESSANDRO
Priority to JP2013148725A priority patent/JP2014067400A/en
Priority to EP13182279.3A priority patent/EP2713578A3/en
Priority to PCT/CN2013/084210 priority patent/WO2014048324A1/en
Priority to TW102137661A priority patent/TW201421390A/en
Publication of US20140067687A1 publication Critical patent/US20140067687A1/en
Assigned to POWA Technologies (Hong Kong) Limited reassignment POWA Technologies (Hong Kong) Limited CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: MPAYME LIMITED
Assigned to 964 BIDCO LIMITED reassignment 964 BIDCO LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: POWA Technologies (Hong Kong) Limited
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Definitions

  • the present invention relates generally to methods of management and execution of electronic bill payments, electronic purchase payments, fund transfers, and other value exchanges. More specifically, the present invention relates to methods of management and execution of financial transactions using mobile communication devices. Still more specifically, the present invention relates to online security for conducting financial transactions using mobile communication devices.
  • Still one obstacle preventing the wide usages and general adoption of these mobile payment methods and systems is the concern for security around the electronic financial transactions conducted over mobile network infrastructures.
  • One particular type of attack on the security of mobile payment systems is the attempt to gain access to the systems by imitating or duplicating the identity of an authorized user, a machine signature of a registered device, or a legitimate data communication message or transaction.
  • Other than deliberate security attacks an authorized user could inadvertently misuse a non-registered or unauthorized device in conducting payment transactions. In these situations, the user, device, data communication message or transaction is said to be “cloned.”
  • Existing methods and systems for securing electronic financial transactions conducted over mobile network infrastructures require expensive implementation, active end users' involvement, or both.
  • the presently claimed invention can also be adapted to be used in other mobile payment method and systems.
  • detection and prevention of unauthorized duplications is called clone defense.
  • a clone defense method and system are adapted to provide one of one or more security layers employed in the mobile payment method and system disclosed in the U.S. patent application Ser. No. 13/602,197.
  • the claimed invention comprises a central processing server accessible through a first communication network, such as the Internet; a plurality of users including individual users and business users; and mobile communication devices and client computing devices that can access the central processing server through the first communication network.
  • a first communication network such as the Internet
  • users including individual users and business users
  • mobile communication devices and client computing devices that can access the central processing server through the first communication network.
  • the authenticity of the financial transactions conducted between the users in this mobile payment system relies primarily on the system restriction that only one mobile communication device is associated (“paired”) with the user account of one user at any time.
  • a clone attack on the security of the mobile payment system occurs when a transaction is conducted from more than one mobile communication device for a user account, or when the data communication within the transaction is transmitted from more than one mobile communication device or from a mobile communication device other than the mobile communication device that was registered initially.
  • the presently claimed clone defense method and system can detect such clone attacks; terminate the transaction in question; and disassociate (“unpair”) the mobile communication device that is paired with the user account involved.
  • each data communication message exchanged between a mobile communication device and the central processing server comprises a first counter value.
  • a second counter value is maintained for each user account.
  • the mobile communication device that is paired with the user account also maintains a third counter value.
  • the first counter value [message CD Counter] within the data communication message is set to the third counter value [device CD Counter] maintained within the paired mobile communication device.
  • the second counter value maintained by the central processing server for the user account is used to compare with the first counter value in the data communication message.
  • the central processing server When the central processing server receives the data communication, it retrieves the first counter value in the data message and compares it with the second counter value. A clone attack is detected if the difference of value between the two counter values is higher than a predetermined tolerance threshold value. After this check is completed, the central processing server increments the second counter by one and sends an acknowledgment message to the paired mobile communication device instructing it to increment the third counter by one. When the mobile communication device sends another data message, the above steps are repeated. Upon the detection of a clone attack, the central processing server discards the transaction that has been carried out in association with the data messages. The central processing server then sends a message to the paired mobile communication device instructing it to reset its configuration to default and also resets the information of the user account as such that the paired mobile communication device is unpaired.
  • fault tolerance functionality is also provided by incorporating a retry flag, which is one or more control data bits, in the data message exchanged between the central processing server and the mobile communication devices. Additional logic in the counter value check process in the central processing server and the mobile communication devices are used to handle the scenario in which a data message is re-sent one or more times due to transmission loss or error.
  • FIG. 1 shows a diagram illustrating the logical composition of a data message being exchanged in a mobile payment system employing the clone defense system in accordance to one embodiment of the present invention
  • FIG. 2 shows a diagram illustrating three possible clone detection scenario in the clone defense system in accordance to one embodiment of the presently claimed invention.
  • a clone defense method and system are adapted to provide one of one or more security layers employed in the mobile payment method and system disclosed in the U.S. patent application Ser. No. 13/602,197.
  • the presently claimed invention can also be adapted to provide the clone defense function in other data communication methods and systems.
  • the claimed invention comprises a central processing server accessible through a first communication network, such as the Internet; a plurality of users including individual users and business users; and mobile communication devices and client computing devices that can access the central processing server through the first communication network.
  • a first communication network such as the Internet
  • users including individual users and business users
  • mobile communication devices and client computing devices that can access the central processing server through the first communication network.
  • the authenticity of the financial transactions conducted between the users in this mobile payment system relies primarily on the system restriction that only one mobile communication device is associated (“paired”) with the user account of one user at any time.
  • a clone attack on the security of the mobile payment system occurs when a transaction is conducted from other than the mobile communication device that was initially paired and used.
  • the presently claimed clone defense method and system can detect such clone security attacks; reset the mobile communication device configuration and terminate the transaction in question; and disassociate (“unpair”) the mobile communication device that is paired with the user account involved.
  • each data communication message exchanged between a mobile communication device and the central processing server comprises a user ID 101 , a device ID 102 , a message Clone Defense Counter (CD Counter) 103 , a retry flag 104 , and an instruction payload 105 .
  • CD Counter message Clone Defense Counter
  • each data communication message is independent and does not require prior transmission hand-shaking or authorization.
  • the portion of the data communication message comprising the message Clone Defense Counter (CD Counter) 103 , the retry flag 104 , and the instruction payload 105 is PKI encrypted using, for example, AES.
  • the PKI encrypted portion of the data communication message and the rest of the data communication message are transmitted over Secure Socket Layer (SSL).
  • SSL Secure Socket Layer
  • the Message CD Counter in each data communication message exchanged between a mobile communication device and the central processing server is a first integer counter value.
  • a second integer counter value (User Account CD Counter) is also maintained for each user account.
  • the mobile communication device that is paired with the user account also maintains a third integer counter value (Device CD Counter).
  • both the User Account CD Counter of a user account and the Device CD Counter will be set to the same randomly generated value when the mobile communication device is paired with the user account.
  • the Message CD Counter value is set to the Device CD Counter value.
  • the central processing server receives the data communication, it retrieves the Message CD Counter in the data message and compares it against the User Account CD Counter associated with the paired mobile communication device to determine if the difference of value between the two counter values is within a predetermined tolerance threshold value.
  • an additional fault tolerance functionality is also provided by incorporating a retry flag 104 , which is one or more control bits, in the data message exchanged between the central processing server and the mobile communication devices. Additional logic in the counter value check and clone detection processes in the central processing server and the mobile communication devices are used to handle the scenario in which a data message is re-sent due to transmission loss or error, or when the corresponding reply data message is not received within a wait time period.
  • the clone detection process includes the following primary scenarios and process steps:
  • the retry flag is set, if the difference of value between the two counter values (
  • a clone attack is detected.
  • the central processing server discards the transaction that has been carried out in association with the data communication messages.
  • the central processing server then sends a message to the paired mobile communication device instructing it to reset its configuration to default and also resets the information of the user account as such that the paired mobile communication device is unpaired.
  • the process step 202 further comprises: If the data communication message is lost, or if the acknowledgment message (corresponding to the data communication message) sent from the central processing server does not reach the mobile computing device within a wait time period, then the data communication message is to be re-sent until a subsequent data communication message and acknowledgment message are successfully exchanged; or a configurable upper limit of number of data communication message resending is reached. This configurable upper limit of number of data communication message resending is same or lower than the aforementioned predetermined tolerance threshold value.
  • the optimal tolerance threshold value is 3.
  • the embodiments disclosed herein may be implemented using general purpose or specialized computing devices, computer processors, or electronic circuitries including but not limited to digital signal processors (DSP), application specific integrated circuits (ASIC), field programmable gate arrays (FPGA), and other programmable logic devices configured or programmed according to the teachings of the present disclosure.
  • DSP digital signal processors
  • ASIC application specific integrated circuits
  • FPGA field programmable gate arrays
  • Computer instructions or software codes running in the general purpose or specialized computing devices, computer processors, or programmable logic devices can readily be prepared by practitioners skilled in the software or electronic art based on the teachings of the present disclosure.
  • the present invention includes computer storage media having computer instructions or software codes stored therein which can be used to program computers or microprocessors to perform any of the processes of the present invention.
  • the storage media can include, but are not limited to, floppy disks, optical discs, Blu-ray Disc, DVD, CD-ROMs, and magneto-optical disks, ROMs, RAMs, flash memory devices, or any type of media or devices suitable for storing instructions, codes, and/or data.

Abstract

A clone attack on the security of the mobile payment system occurs when a transaction is conducted from more than one mobile communication device for a user account, or when the data communication within the transaction is transmitted from more than one mobile communication device or from a mobile communication device other than the mobile communication device that was registered initially. The presently claimed clone defense method and system employ a first counter in each data communication message, a second counter at the sending end, and a third counter at the receiving end. By incrementing the counters when sending and receiving the data communication messages and matching the counters at the receiving end, clone attacks can be detected.

Description

    CLAIM FOR DOMESTIC PRIORITY
  • This application claims priority under 35 U.S.C. §119 to the U.S. Provisional Utility Patent Application No. 61/705,644, filed Sep. 26, 2012, and the disclosure of which is incorporated herein by reference in its entirety.
  • CROSS-REFERENCE TO RELATED APPLICATION
  • This application is a continuation-in-part of U.S. patent application Ser. No. 13/602,197 filed Sep. 2, 2012, the disclosure of which is incorporated herein by reference in its entirety.
  • COPYRIGHT NOTICE
  • A portion of the disclosure of this patent document contains material, which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.
  • FIELD OF THE INVENTION
  • The present invention relates generally to methods of management and execution of electronic bill payments, electronic purchase payments, fund transfers, and other value exchanges. More specifically, the present invention relates to methods of management and execution of financial transactions using mobile communication devices. Still more specifically, the present invention relates to online security for conducting financial transactions using mobile communication devices.
  • BACKGROUND
  • Modern day commerce involves conducting financial transactions through many different channels using a variety of instruments. Payment transfer of physical currency is the most common means when the transacting parties are located away from any banking facility. Other payment methods and systems have appeared over the years. Credit cards, debit cards, Internet online payment services such as PayPal™, and near field communication (NFC) enabled stored value holder devices and systems, such as the Octopus Card widely used in Hong Kong, China, are some of the more prevalent examples. However, none of the existing payment methods and systems has achieved the same level of ubiquity and ease of use as cash. Each of these payment methods and systems requires its own dedicated infrastructure and/or is limited to a few channels. For instance, credit card payments require the merchants or the payees to be equipped with card readers and fixed communication networks connecting the readers to the clearance centers.
  • Another shortcoming of existing payment methods and systems is that person-to-person transactions are either unfeasible or highly inconvenient. Take credits cards, debit cards, and other stored value cards for instance. Although it is possible to mass-produce personal card readers with the current technology, the need for dedicated infrastructures, which are yet to be built out on a scale beyond the city metropolitan level, is an impediment to their general availability and adoption.
  • Still one obstacle preventing the wide usages and general adoption of these mobile payment methods and systems is the concern for security around the electronic financial transactions conducted over mobile network infrastructures. One particular type of attack on the security of mobile payment systems is the attempt to gain access to the systems by imitating or duplicating the identity of an authorized user, a machine signature of a registered device, or a legitimate data communication message or transaction. Other than deliberate security attacks, an authorized user could inadvertently misuse a non-registered or unauthorized device in conducting payment transactions. In these situations, the user, device, data communication message or transaction is said to be “cloned.” Existing methods and systems for securing electronic financial transactions conducted over mobile network infrastructures require expensive implementation, active end users' involvement, or both.
  • SUMMARY
  • It is an objective of the present invention to provide a method and system for securing electronic financial transactions conducted over mobile network infrastructures that can be used in conjunction with the mobile payment method and system disclosed in the U.S. patent application Ser. No. 13/602,197. The presently claimed invention can also be adapted to be used in other mobile payment method and systems.
  • It is a further objective of the present invention to provide such method and system for detecting and preventing the unauthorized duplications of the identity of, data communication messages sent to and received from, and/or transactions initiated from a mobile communication device registered and authorized to participate in a secured mobile payment network. Such detection and prevention of unauthorized duplications is called clone defense.
  • In accordance with the preferred embodiment of the present invention, a clone defense method and system are adapted to provide one of one or more security layers employed in the mobile payment method and system disclosed in the U.S. patent application Ser. No. 13/602,197.
  • In accordance with various embodiments of the mobile payment system disclosed in the U.S. patent application Ser. No. 13/602,197, the claimed invention comprises a central processing server accessible through a first communication network, such as the Internet; a plurality of users including individual users and business users; and mobile communication devices and client computing devices that can access the central processing server through the first communication network. The authenticity of the financial transactions conducted between the users in this mobile payment system relies primarily on the system restriction that only one mobile communication device is associated (“paired”) with the user account of one user at any time.
  • A clone attack on the security of the mobile payment system occurs when a transaction is conducted from more than one mobile communication device for a user account, or when the data communication within the transaction is transmitted from more than one mobile communication device or from a mobile communication device other than the mobile communication device that was registered initially. The presently claimed clone defense method and system can detect such clone attacks; terminate the transaction in question; and disassociate (“unpair”) the mobile communication device that is paired with the user account involved.
  • In accordance to one embodiment of the presently claimed clone defense method and system, each data communication message exchanged between a mobile communication device and the central processing server comprises a first counter value. In the central processing server, a second counter value is maintained for each user account. The mobile communication device that is paired with the user account also maintains a third counter value. When a data communication message is sent from the paired mobile communication device to the central processing server, the first counter value [message CD Counter] within the data communication message is set to the third counter value [device CD Counter] maintained within the paired mobile communication device. When the data communication message is received, the second counter value maintained by the central processing server for the user account is used to compare with the first counter value in the data communication message. When the central processing server receives the data communication, it retrieves the first counter value in the data message and compares it with the second counter value. A clone attack is detected if the difference of value between the two counter values is higher than a predetermined tolerance threshold value. After this check is completed, the central processing server increments the second counter by one and sends an acknowledgment message to the paired mobile communication device instructing it to increment the third counter by one. When the mobile communication device sends another data message, the above steps are repeated. Upon the detection of a clone attack, the central processing server discards the transaction that has been carried out in association with the data messages. The central processing server then sends a message to the paired mobile communication device instructing it to reset its configuration to default and also resets the information of the user account as such that the paired mobile communication device is unpaired.
  • In accordance to one embodiment of the presently claimed clone defense method and system, fault tolerance functionality is also provided by incorporating a retry flag, which is one or more control data bits, in the data message exchanged between the central processing server and the mobile communication devices. Additional logic in the counter value check process in the central processing server and the mobile communication devices are used to handle the scenario in which a data message is re-sent one or more times due to transmission loss or error.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Embodiments of the invention are described in more detail hereinafter with reference to the drawings, in which:
  • FIG. 1 shows a diagram illustrating the logical composition of a data message being exchanged in a mobile payment system employing the clone defense system in accordance to one embodiment of the present invention; and
  • FIG. 2 shows a diagram illustrating three possible clone detection scenario in the clone defense system in accordance to one embodiment of the presently claimed invention.
  • DETAILED DESCRIPTION
  • In the following description, methods and systems for providing detection and prevention mechanism against clone attacks on mobile payment systems and the likes are set forth as preferred examples. It will be apparent to those skilled in the art that modifications, including additions and/or substitutions may be made without departing from the scope and spirit of the invention. Specific details may be omitted so as not to obscure the invention; however, the disclosure is written to enable one skilled in the art to practice the teachings herein without undue experimentation.
  • In accordance with the preferred embodiment of the presently claimed invention, a clone defense method and system are adapted to provide one of one or more security layers employed in the mobile payment method and system disclosed in the U.S. patent application Ser. No. 13/602,197. The presently claimed invention can also be adapted to provide the clone defense function in other data communication methods and systems.
  • In accordance with various embodiments of the mobile payment system disclosed in the U.S. patent application Ser. No. 13/602,197, the claimed invention comprises a central processing server accessible through a first communication network, such as the Internet; a plurality of users including individual users and business users; and mobile communication devices and client computing devices that can access the central processing server through the first communication network. The authenticity of the financial transactions conducted between the users in this mobile payment system relies primarily on the system restriction that only one mobile communication device is associated (“paired”) with the user account of one user at any time.
  • A clone attack on the security of the mobile payment system occurs when a transaction is conducted from other than the mobile communication device that was initially paired and used. The presently claimed clone defense method and system can detect such clone security attacks; reset the mobile communication device configuration and terminate the transaction in question; and disassociate (“unpair”) the mobile communication device that is paired with the user account involved.
  • Referring to FIG. 1. In accordance to one embodiment of the presently claimed clone defense method and system, each data communication message exchanged between a mobile communication device and the central processing server comprises a user ID 101, a device ID 102, a message Clone Defense Counter (CD Counter) 103, a retry flag 104, and an instruction payload 105. Under a session-less and stateless transmission protocol, such as that used in an exemplary embodiment in accordance to the invention claimed in the U.S. patent application Ser. No. 13/602,197, each data communication message is independent and does not require prior transmission hand-shaking or authorization. In accordance to one embodiment, the portion of the data communication message comprising the message Clone Defense Counter (CD Counter) 103, the retry flag 104, and the instruction payload 105 is PKI encrypted using, for example, AES. The PKI encrypted portion of the data communication message and the rest of the data communication message are transmitted over Secure Socket Layer (SSL).
  • In accordance to one embodiment of the presently claimed clone defense method and system, the Message CD Counter in each data communication message exchanged between a mobile communication device and the central processing server is a first integer counter value. In the central processing server, a second integer counter value (User Account CD Counter) is also maintained for each user account. The mobile communication device that is paired with the user account also maintains a third integer counter value (Device CD Counter).
  • In accordance to one embodiment, both the User Account CD Counter of a user account and the Device CD Counter will be set to the same randomly generated value when the mobile communication device is paired with the user account.
  • When a data communication message is sent from the paired mobile communication device to the central processing server, the Message CD Counter value is set to the Device CD Counter value. When the central processing server receives the data communication, it retrieves the Message CD Counter in the data message and compares it against the User Account CD Counter associated with the paired mobile communication device to determine if the difference of value between the two counter values is within a predetermined tolerance threshold value.
  • Still referring to FIG. 1. In accordance to one embodiment of the presently claimed clone defense method and system, an additional fault tolerance functionality is also provided by incorporating a retry flag 104, which is one or more control bits, in the data message exchanged between the central processing server and the mobile communication devices. Additional logic in the counter value check and clone detection processes in the central processing server and the mobile communication devices are used to handle the scenario in which a data message is re-sent due to transmission loss or error, or when the corresponding reply data message is not received within a wait time period.
  • Referring to FIG. 2. In accordance to one embodiment of the presently claimed clone defense method and system with the additional fault tolerance functionality, the clone detection process includes the following primary scenarios and process steps:
  • 201: When both the Message CD Counter and the User Account CD Counter in the central processing server are having the same value x, regardless of the value the retry flag, the data communication message is regarded as authentic and accepted.
  • When a data communication message having a Message CD Counter value=x is sent by the mobile computing device, under normal operation, at the message-receiving central processing server, the User Account CD Counter should also have a value=x at the time of receiving the data communication message.
  • 202: On the other hand, if the data communication message is lost, or if the acknowledgment message from the central processing server does not reach the mobile computing device within a predetermined wait time period, then the mobile computing device will proceed to resend the data communication message as a re-sent data communication message upon the expiration of the wait time period, wherein the re-sent data communication message will have a Message CD Counter value=x and a retry flag being set. The User Account CD Counter at the message-receiving central processing server, on the other hand, might have a value=x+i, i=1, 2, 3, . . . , n, depending on the number times the re-sent data communication message is received and the acknowledgment message is sent since the central processing server increments the User Account CD Counter by one before sending the acknowledgment message.
  • However, because the retry flag is set, if the difference of value between the two counter values (|Message CD Counter value−User Account CD Counter value|) is not higher than a predetermined tolerance threshold value, the re-sent data communication message is still regarded as authentic and accepted. In this case, the User Account CD Counter value will be set to the Message CD Counter value before it is to be incremented and the acknowledgment message to be sent.
  • 203: When the values of the Message CD Counter and the User Account CD Counter are unmatched and that the retry flag in the data communication message is unset, a clone attack is detected. Upon the detection of a clone attack, the central processing server discards the transaction that has been carried out in association with the data communication messages. The central processing server then sends a message to the paired mobile communication device instructing it to reset its configuration to default and also resets the information of the user account as such that the paired mobile communication device is unpaired.
  • Due to the varying degrees of severity of the adverse effects existing in different geographic regions or mobile communication infrastructures and in turn the varying probabilities of occurrences of failed and incomplete transactions, it is desirable that the reliability factors of the fault tolerance functionality are adjustable. As such, the present invention allows a configurable number of resend of a data communication message. Under this alternative embodiment, the process step 202 further comprises: If the data communication message is lost, or if the acknowledgment message (corresponding to the data communication message) sent from the central processing server does not reach the mobile computing device within a wait time period, then the data communication message is to be re-sent until a subsequent data communication message and acknowledgment message are successfully exchanged; or a configurable upper limit of number of data communication message resending is reached. This configurable upper limit of number of data communication message resending is same or lower than the aforementioned predetermined tolerance threshold value.
  • The following table summarizes the scenarios of the clone detection process with the additional fault tolerance functionality:
  • Message and User
    Account CD Retry Flag Clone
    Counter values state Detection Scenario
    Match Unset False Normal operation
    Unmatched by ≦ Unset True Clone attack
    tolerance threshold
    Unmatched by ≦ Set False Data communication
    tolerance threshold message re-sent
    Unmatched by > Unset True Clone attack or tampering
    tolerance threshold
    Unmatched by > Set True Clone attack or tampering
    tolerance threshold
  • Based on observations and results from trial runs of the secure mobile payment system in accordance to the present invention implemented on typical mobile network infrastructures and geographic regions, the optimal tolerance threshold value is 3.
  • The embodiments disclosed herein may be implemented using general purpose or specialized computing devices, computer processors, or electronic circuitries including but not limited to digital signal processors (DSP), application specific integrated circuits (ASIC), field programmable gate arrays (FPGA), and other programmable logic devices configured or programmed according to the teachings of the present disclosure. Computer instructions or software codes running in the general purpose or specialized computing devices, computer processors, or programmable logic devices can readily be prepared by practitioners skilled in the software or electronic art based on the teachings of the present disclosure.
  • In some embodiments, the present invention includes computer storage media having computer instructions or software codes stored therein which can be used to program computers or microprocessors to perform any of the processes of the present invention. The storage media can include, but are not limited to, floppy disks, optical discs, Blu-ray Disc, DVD, CD-ROMs, and magneto-optical disks, ROMs, RAMs, flash memory devices, or any type of media or devices suitable for storing instructions, codes, and/or data.
  • The foregoing description of the present invention has been provided for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise forms disclosed. Many modifications and variations will be apparent to the practitioner skilled in the art.
  • The embodiments were chosen and described in order to best explain the principles of the invention and its practical application, thereby enabling others skilled in the art to understand the invention for various embodiments and with various modifications that are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the following claims and their equivalence.

Claims (16)

What is claimed is:
1. A computer implemented method for detecting clone attack in data communication, comprising:
maintaining, by a central processing server, a second counter for each user account of one or more user accounts;
maintaining, by a communication device, a third counter;
setting both the second counter and the third counter to an initial value when the communication device is paired with a user account corresponding to the second counter;
setting, by the communication device, a first counter value to the third counter value;
generating, by the communication device, a data communication message, wherein the data communication message comprising the first counter;
sending, by the communication device, the data communication message to the central processing server;
receiving, by the central processing server, the data communication message;
comparing, by the central processing server, the first counter value against the second counter value for the user account associated with the communication device;
determining, by the central processing server, whether a clone attack is occurring;
if no clone attack is detected, incrementing, by the central processing server, the second counter value by one value unit; and
if no clone attack is detected, incrementing, by the communication device, the third counter value by one value unit.
2. The method of claim 1, wherein the step of determining whether a clone attack is occurring further comprises:
a clone attack is detected if the first counter value does not match the second counter value.
3. The method of claim 1, further comprising:
if no clone attack is detected, before the step of incrementing the third counter value, sending, by the central processing server, an acknowledgment message to the communication device.
4. The method of claim 1, further comprising:
after the step of sending, by the communication device, the data communication message to the central processing server:
waiting, by the communication device, for an acknowledgment message from the central processing server, for a waiting time period;
if the acknowledgment message is not received within the waiting time period:
resending, by the communication device, the data communication message to the central processing server, wherein the data communication message further comprises a retry flag, and wherein the retry flag is set to a value representing a retry status; and
repeating the steps from waiting for an acknowledgment message from the central processing server for a waiting period to resending the data communication message until the acknowledgment message is received the waiting time period or upper limit of number of data communication message resending is reached.
5. The method of claim 1, wherein the step of determining whether a clone attack is occurring further comprises:
a clone attack is not detected if the retry flag is set to a value representing a retry status and difference of value between the first counter value and the second counter value is not higher than a tolerance threshold value;
a clone attack is detected if difference of value between the first counter value and the second counter value is higher than a tolerance threshold value; and
a clone attack is detected if a retry flag in the data communication message is unset and the first counter value does not match the second counter value.
6. The method of claim 5, wherein the tolerance threshold value is one.
7. The method of claim 5, wherein the tolerance threshold value is three.
8. The method of claim 1, wherein the initial value being a randomly generated number.
9. A system for detecting clone attack in data communication, comprising:
a central processing server configured to:
maintain a second counter for each user account of one or more user accounts;
set both the second counter and a third counter to an initial value when a communication device is paired with a user account corresponding to the second counter;
receive a data communication message from the communication device;
compare a first counter value contained within the data communication message against the second counter value for the user account associated with the communication device;
determine whether a clone attack is occurring; and
if no clone attack is detected, increment the second counter value by one value unit; and
the communication device configured to:
maintain the third counter;
set the first counter value to the third counter value;
generate a data communication message, wherein the data communication message comprising the first counter;
send the data communication message to the central processing server; and
if no clone attack is detected, increment the third counter value by one value unit.
10. The system of claim 9, wherein the central processing server is further configured to determine that a clone attack is detected if the first counter value does not match the second counter value.
11. The system of claim 9, wherein the central processing server is further configured to send an acknowledgment message to the communication device if no clone attack is detected.
12. The system of claim 9, wherein the communication device is further configured to:
wait for an acknowledgment message from the central processing server, for a waiting time period after the step of sending the data communication message to the central processing server;
if the acknowledgment message is not received within the waiting time period:
resend the data communication message to the central processing server, wherein the data communication message further comprises a retry flag, and wherein the retry flag is set to a value representing a retry status; and
repeat the steps from waiting for an acknowledgment message from the central processing server for a waiting period to resending the data communication message until the acknowledgment message is received the waiting time period or upper limit of number of data communication message resending is reached.
13. The system of claim 9, wherein the step of determining whether a clone attack is occurring further comprises:
a clone attack is not detected if the retry flag is set to a value representing a retry status and difference of value between the first counter value and the second counter value is not higher than a tolerance threshold value;
a clone attack is detected if difference of value between the first counter value and the second counter value is higher than a tolerance threshold value; and
a clone attack is detected if a retry flag in the data communication message is unset and the first counter value does not match the second counter value.
14. The system of claim 13, wherein the tolerance threshold value is one.
15. The system of claim 13, wherein the tolerance threshold value is three.
16. The system of claim 9, wherein the initial value being a randomly generated number.
US13/891,207 2012-09-02 2013-05-10 Clone defence system for secure mobile payment Abandoned US20140067687A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
US13/891,207 US20140067687A1 (en) 2012-09-02 2013-05-10 Clone defence system for secure mobile payment
JP2013148725A JP2014067400A (en) 2012-09-26 2013-07-17 Clone prevention system for secure mobile payment
EP13182279.3A EP2713578A3 (en) 2012-09-26 2013-08-29 Clone defence system and method for secure mobile payment
PCT/CN2013/084210 WO2014048324A1 (en) 2012-09-26 2013-09-25 Clone defence system for secure mobile payment
TW102137661A TW201421390A (en) 2012-10-19 2013-10-18 Method and system for secure mobile payment

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US13/602,197 US20130262309A1 (en) 2012-04-02 2012-09-02 Method and System for Secure Mobile Payment
US201261705644P 2012-09-26 2012-09-26
US13/891,207 US20140067687A1 (en) 2012-09-02 2013-05-10 Clone defence system for secure mobile payment

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/602,197 Continuation-In-Part US20130262309A1 (en) 2012-04-02 2012-09-02 Method and System for Secure Mobile Payment

Publications (1)

Publication Number Publication Date
US20140067687A1 true US20140067687A1 (en) 2014-03-06

Family

ID=49080736

Family Applications (1)

Application Number Title Priority Date Filing Date
US13/891,207 Abandoned US20140067687A1 (en) 2012-09-02 2013-05-10 Clone defence system for secure mobile payment

Country Status (4)

Country Link
US (1) US20140067687A1 (en)
EP (1) EP2713578A3 (en)
JP (1) JP2014067400A (en)
WO (1) WO2014048324A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2546135B (en) * 2016-01-06 2019-01-09 Adobe Systems Inc Robust computing device identification framework
US20200412708A1 (en) * 2019-06-28 2020-12-31 Slack Technologies, Inc. Link protocol agents for inter-application communications

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030079143A1 (en) * 2001-10-22 2003-04-24 Dean Mikel One pass security
US20060064458A1 (en) * 2002-09-16 2006-03-23 Christian Gehrmann Secure access to a subscription module
US20060101153A1 (en) * 2002-05-09 2006-05-11 Antoine Boucher Store and forward architecture
US20070101152A1 (en) * 2005-10-17 2007-05-03 Saflink Corporation Token authentication system
US20070174472A1 (en) * 2006-01-20 2007-07-26 Verimatrix, Inc. Network security system and method
US20090177882A1 (en) * 2006-02-22 2009-07-09 Swami Saran Authentication Token for Identifying a Cloning Attack onto such Authentication Token
US20100332829A1 (en) * 2009-06-26 2010-12-30 Nagravision S.A. Method for detecting the use of a cloned user unit communicating with a server
US20110170532A1 (en) * 2008-09-26 2011-07-14 France Telecom Distribution of an authentication function in a mobile network
US20110184867A1 (en) * 2010-01-27 2011-07-28 Arcot Systems, Inc. System and method for generating a dynamic card value
US8578473B2 (en) * 2009-03-25 2013-11-05 Lsi Corporation Systems and methods for information security using one-time pad

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH04242459A (en) * 1991-01-17 1992-08-31 Toshiba Corp Message retransmission system
US6466780B1 (en) * 1997-09-03 2002-10-15 Interlok Technologies, Llc Method and apparatus for securing digital communications
JP3266199B2 (en) * 1999-12-22 2002-03-18 日本電気株式会社 Reliable data transfer method
US20050086465A1 (en) * 2003-10-16 2005-04-21 Cisco Technology, Inc. System and method for protecting network management frames
US7861308B2 (en) * 2005-11-28 2010-12-28 Sony Corporation Digital rights management using trusted time
JP4943955B2 (en) * 2007-06-29 2012-05-30 オーエスエスブロードネット株式会社 CATV transmission line monitoring apparatus, method and program
US10839384B2 (en) * 2008-12-02 2020-11-17 Paypal, Inc. Mobile barcode generation and payment
AU2009323748B2 (en) * 2008-12-03 2015-07-02 Entersekt International Limited Secure transaction authentication
US8572394B2 (en) * 2009-09-04 2013-10-29 Computer Associates Think, Inc. OTP generation using a camouflaged key
CA2724297C (en) * 2010-12-14 2013-11-12 Xtreme Mobility Inc. System and method for authenticating transactions through a mobile device
JP5692244B2 (en) * 2011-01-31 2015-04-01 富士通株式会社 Communication method, node, and network system
CN102332127A (en) * 2011-09-15 2012-01-25 深圳市酷开网络科技有限公司 Network TV (television) online payment service based account binding method and payment method

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030079143A1 (en) * 2001-10-22 2003-04-24 Dean Mikel One pass security
US20060101153A1 (en) * 2002-05-09 2006-05-11 Antoine Boucher Store and forward architecture
US20060064458A1 (en) * 2002-09-16 2006-03-23 Christian Gehrmann Secure access to a subscription module
US20070101152A1 (en) * 2005-10-17 2007-05-03 Saflink Corporation Token authentication system
US20070174472A1 (en) * 2006-01-20 2007-07-26 Verimatrix, Inc. Network security system and method
US20090177882A1 (en) * 2006-02-22 2009-07-09 Swami Saran Authentication Token for Identifying a Cloning Attack onto such Authentication Token
US20110170532A1 (en) * 2008-09-26 2011-07-14 France Telecom Distribution of an authentication function in a mobile network
US8578473B2 (en) * 2009-03-25 2013-11-05 Lsi Corporation Systems and methods for information security using one-time pad
US20100332829A1 (en) * 2009-06-26 2010-12-30 Nagravision S.A. Method for detecting the use of a cloned user unit communicating with a server
US20110184867A1 (en) * 2010-01-27 2011-07-28 Arcot Systems, Inc. System and method for generating a dynamic card value

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2546135B (en) * 2016-01-06 2019-01-09 Adobe Systems Inc Robust computing device identification framework
US20200412708A1 (en) * 2019-06-28 2020-12-31 Slack Technologies, Inc. Link protocol agents for inter-application communications
US11936638B2 (en) * 2019-06-28 2024-03-19 Salesforce Inc. Link protocol agents for inter-application communications

Also Published As

Publication number Publication date
EP2713578A3 (en) 2015-08-12
EP2713578A2 (en) 2014-04-02
JP2014067400A (en) 2014-04-17
WO2014048324A1 (en) 2014-04-03

Similar Documents

Publication Publication Date Title
US10909522B2 (en) Cloud-based transactions methods and systems
US11842350B2 (en) Offline authentication
US11875344B2 (en) Cloud-based transactions with magnetic secure transmission
US9978094B2 (en) Tokenization revocation list
US10547625B2 (en) Software tampering detection and reporting process
US10346814B2 (en) System and method for executing financial transactions
US20220019995A1 (en) Limited-use keys and cryptograms
WO2012123394A1 (en) Off-line transfer of electronic tokens between peer-devices
US20140067687A1 (en) Clone defence system for secure mobile payment
WO2022047582A1 (en) Blockchain-based technologies for secure offline transaction processing
JP2023552054A (en) Methods and systems for authentication of high-risk communications

Legal Events

Date Code Title Description
AS Assignment

Owner name: MPAYME LTD., HONG KONG

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GADOTTI, ALESSANDRO;REEL/FRAME:030389/0220

Effective date: 20121228

AS Assignment

Owner name: POWA TECHNOLOGIES (HONG KONG) LIMITED, HONG KONG

Free format text: CHANGE OF NAME;ASSIGNOR:MPAYME LIMITED;REEL/FRAME:038223/0811

Effective date: 20141021

AS Assignment

Owner name: 964 BIDCO LIMITED, UNITED KINGDOM

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:POWA TECHNOLOGIES (HONG KONG) LIMITED;REEL/FRAME:038332/0496

Effective date: 20160303

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE